RSC-25B_Class-029-20

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Match the descriptions to the corresponding DHCPv6 server type. (Not all options are used.) - Stateful DHCPv6

- The M flag is set to 1 in the RA message - uses the address command to create a pool of addresses for clients -enables on the client with the ipv6 address dhcp command

Match the descriptions to the corresponding DHCPv6 server type. (Not all options are used.) - Stateless DHCPv6

- enabled in RA messages with the ipv6 nd other-config-flag command - clients send only DHCPv6 INFORMATION-REQUEST messages to the server - Enabled on the client with the ipv6 address autoconfig command

match the functions to the corresponding layers. - core layer

- provides high-speed backbone connectivity -functions as an aggregator for all the campus blocks

match the functions to the corresponding layers. - access layer

- represents the network edge -provides network access to the user

Which two characteristics describe a converged network? (Choose two.)

- support of voice and video both using the same switch - affordability for small and medium businesses

Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)

- user data traffic -VoIP phone traffic

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined? (Choose two.)

-A full version of the Cisco IOS was located and loaded. -POST occurred normally.

What are two functions of a router? (Choose two.)

-A router connects multiple IP networks. -It determines the best path to send packets.

Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)

-A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2 -A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2

What are two uses of an access control list? (Choose two.)

-ACLs provide a basic level of security for network access. -ACLs can control which areas a host can access on a network.

Which four steps are needed to configure a voice VLAN on a switch port? (Choose four).

-Add a voice VLAN. -Assign the voice VLAN to the switch port. -Configure the switch port in access mode. -Ensure that voice traffic is trusted and tagged with a CoS priority value.

Required steps for SSH Configuration. 5 Steps

-Create a local user -Generate RSA keys -Config a domain name -use the login local command -use the transport input ssh command

Which three software packages are available for Cisco IOS Release 15.0?

-DATA -Security -Unified Communications

Which two statements are true regarding switch port security? (Choose two.)

-Dynamically learned secure MAC addresses are lost when the switch reboots. -If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

Which three statements describe ACL processing of packets? (Choose three.)

-Each statement is checked only until a match is detected or until the end of the ACE list. -A packet can either be rejected or forwarded as directed by the ACE that is matched. -An implicit deny any rejects any packet that does not match any ACE

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

-Filter unwanted traffic before it travels onto a low-bandwidth link. -Place standard ACLs close to the destination IP address of the traffic. -Place extended ACLs close to the source IP address of the traffic.

Which two statements are true about using full-duplex Fast Ethernet? (Choose two.)

-Full-duplex Fast Ethernet offers 100 percent efficiency in both directions. -Performance is improved with bidirectional data flow.

What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

-IP addresses -Layer 1 statuses

What are two of the required steps to configure PAT? (Choose two.)

-Identify the inside interface. -Define a pool of global addresses to be used for overload translation.

What are two benefits of NAT? (Choose two.)

-It adds a degree of privacy and security to a network. -It saves public IP addresses.

Which two statements describe characteristics of load balancing? (Choose two.)

-Load balancing allows a router to forward packets over multiple paths to the same destination network. -Unequal cost load balancing is supported by EIGRP.

Which two statements are true about NTP servers in an enterprise network? (Choose two.)

-NTP servers ensure an accurate time stamp on logging and debugging information. -NTP servers at stratum 1 are directly connected to an authoritative time source.

Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol? (Choose two.)

-RIP version 2 is running on this router and its RIP neighbor. -The command no auto-summary has been used on the RIP neighbor router.

Which two statements correctly describe the components of a router? (Choose two.)

-ROM contains diagnostics executed on hardware modules. -Flash memory does not lose its contents during a reboot.

Which two commands will configure a standard ACL? (Choose two.)

-Router(config)# access-list 90 permit 192.168.10.5 0.0.0.0 -Router(config)# access-list 35 permit host 172.31.22.7

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)

-Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 -Router(config)# access-list 95 permit any

A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.)

-Router1(config)# access-list 10 permit host 192.168.15.23 -Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0

Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)

-Routes with the smallest metric to a destination indicate the best path. -Administrative distance refers to the trustworthiness of a particular route.

In addition to IPBase, what are the three technology packs that are shipped within the universal Cisco IOS Software Release 15 image? (Choose three.)

-Security -DATA -Unified communications

What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.)

-Static routing is more secure. -Static routing uses less router processing and bandwidth.

What are two advantages of static routing over dynamic routing? (Choose two.)

-Static routing uses fewer router resources than dynamic routing. -Static routing is more secure because it does not advertise over the network.

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

-The IP address of R1 is 192.168.1.2. -Router R1 is the master, and R2 is the client.

Refer to the exhibit. A network administrator issues the show ipv6 route command on R1. What two conclusions can be drawn from the routing table? (Choose two.)

-The interface Fa0/1 is configured with IPv6 address 2001:DB8:ACAD:A::12. -R1 does not know a route to any remote networks.

Refer to the exhibit. What two statements describe the NTP status of the router? (Choose two.)

-The router is attached to a stratum 2 device. -The IP address of the time source for the router is 192.168.1.1.

Which two characteristics match extended range VLANs? (Choose two.)

-They are saved in the running-config file by default. -VLAN IDs exist between 1006 to 4094.

Which two statements describe static routes? (Choose two.)

-They require manual reconfiguration to accommodate network changes. -They are identified in the routing table with the prefix S.

Under which two circumstances would a router usually be configured as a DHCPv4 client? (Choose two.)

-This is an ISP requirement. -The router is intended to be used as a SOHO gateway.

Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)

-This message indicates that service timestamps have been configured. -This message is a level 5 notification message.

Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)

-Verify that there is enough flash memory for the new Cisco IOS image using the show flash command. -Verify connectivity between the router and TFTP server using the ping command.

What are two common types of static routes in routing tables? (Choose two)

-a static route to a specific network -a default static route

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking?​ (Choose two.)

-between two switches that utilize multiple VLANs -between a switch and a server that has an 802.1Q NIC

Which two requirements are used to determine if a route can be considered as an ultimate route in a router's routing table? (Choose two.)

-contain an exit interface -contain a next-hop IP address

Which two parameters are used by EIGRP as metrics to select the best path to reach a network? (Choose two.)​

-delay -bandwidth

Which two items are used by a host device when performing an ANDing operation to determine if a destination address is on the same local network? (Choose two.)

-destination IP address -subnet mask

What two criteria are used by a Cisco LAN switch to decide how to forward Ethernet frames? (Choose two.)

-destination MAC address -ingress port

A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)

-easier to provide redundant links to ensure higher availability -simpler deployment for additional switch equipment

Match the forwarding characteristic to its type. (Not all options are used.)- store-and-forward

-error checking before forwarding -forwarding process only begins after receiving the entire frame -only forwards valid frames

Match the forwarding characteristic to its type. (Not all options are used.) cut-through

-forwarding process can begin after receiving the destination address -may forward invalid frames -appropriate for high performance computing applications

match the functions to the corresponding layers. - distribution layer

-implements network access policy -establishes Layer 3 routing boundaries

What are two advantages of modular switches over fixed-configuration switches? (Choose two.)

-increased scalability -need for fewer power outlets

Refer to the exhibit. Which two types of routes could be used to describe the 192.168.200.0/30 route? (Choose two.)

-level 2 child route -ultimate route

What two tasks do dynamic routing protocols perform? (Choose two.)

-network discovery -update and maintain routing tables

Match the characteristic to the corresponding type of routing. (Not all options are used.) - Dynamic Routing

-new networks are added automatically to the routing table -best choice for large networks

A network administrator notices that a correctly entered static route is not in the routing table. What two router commands would an administrator use to determine if the exit interface was up and the next hop address is available? (Choose two.)

-ping -show ip interface brief

Which three IOS troubleshooting commands can help to isolate problems with a static route? (Choose three.)

-ping -show ip route -show ip interface brief

What two methods can be used to generate an interface ID by an IPv6 host that is using SLAAC? (Choose two.)

-random generation -EUI-64

What are three primary benefits of using VLANs? (Choose three.)

-security -cost reduction -improved IT staff efficiency

Which two statements are true regarding classless routing protocols? (Choose two.)

-sends subnet mask information in routing updates -allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology

In order for packets to be sent to a remote destination, what three pieces of information must be configured on a host? (Choose three.)

-subnet mask -default gateway -IP address

What two pieces of information are needed in a fully specified static route to eliminate recursive lookups? (Choose two.)

-the interface ID exit interface -the IP address of the next-hop neighbor

What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)

-to enhance user bandwidth -to isolate traffic between segments

What are two functions of dynamic routing protocols? (Choose two.)

-to maintain routing tables -to discover the network

Match the characteristic to the corresponding type of routing. (Not all options are used.) - Static Routing

-typically used on stub networks -less routing overhead

What network address and subnet mask combination would be used to create a default static route that matches any IPv4 destination?

0.0.0.0 0.0.0.0

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. When PC0 pings the web server, which MAC address is the source MAC address in the frame from R2 to the web server?

0001.C972.4202

What is the factory default setting for the configuration register on Cisco routers?

0x2102

Refer to the exhibit. Fill in the blank.How many broadcast domains are in the topology?

1

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) - Step 1

1. The client uses the inside global address of the web server as the destination address to send a packet to the web server.

Refer to the exhibit. A switch receives a Layer 2 frame that contains a source MAC address of 000b.a023.c501 and a destination MAC address of 0050.0fae.75aa. Place the switch steps in the order they occur. (Not all options are used.)

1. The switch adds the source MAC address to the MAC address table. 2. Because the destination is not known, the switch forwards the frame out all ports except the port through which the frame arrived.

What are the three layers of the switch hierarchical design model? (Choose three.)

1. access 2. core 3. distribution

Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE?

10.120.160.0 to 10.120.167.255

An administrator issues the ipv6 route 2001:db8:acad:1::/32 gigabitethernet0/0 2001:db8:acad:6::1 100 command on a router. What administrative distance is assigned to this route?

100

What is the bandwidth utilization efficiency of full-duplex Ethernet?

100%

Refer to the exhibit. What is the administrative distance value of the route for router R1 to reach the destination IPv6 address of 2001:DB8:CAFE:4::A?

120

What is the major release number in the IOS image name c1900-universalk9-mz.SPA.152-3.T.bin?

15

A company has several networks with the following IP address requirements: IP phones - 50 PCs - 70 IP cameras - 10 wireless access points - 10 network printers - 10 network scanners - 2 Which block of addresses would be the minimum to accommodate all of these devices if each type of device was on its own network?

172.16.0.0/24

Refer to the exhibit. PC A sends a request to Server B. What IPv4 address is used in the destination field in the packet as the packet leaves PC A?

192.168.12.16

On R1, the command to configure a static route to network 172.16.2.0 by specifying the next-hop IP address is ip route 172.16.2.0 255.255.255.0___________ .​

192.168.2.2

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) - Step 2

2. R2 receives the packet on its outside interface, then checks and locates the destination address in its NAT table.

Refer to the exhibit. Which address or addresses represent the inside global address?

209.165.20.25

A college offers classes at a nearby naval base where a remote switch is located. In order for network administrators at the college main office to manage a remote switch for SSH traffic, which destination port number should be opened and tracked on the college firewall?

22

What is the destination IP address when an IPv4 host sends a DHCPDISCOVER message?

255.255.255.255

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2?

2682112

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) - Step 3

3. R2 replaces the inside global address with the inside local address of the web server and forwards the packet to the web server.

Refer to the exhibit. A network administrator needs to configure router-on-a-stick for the networks that are shown. How many subinterfaces will have to be created on the router if each VLAN that is shown is to be routed and each VLAN has its own subinterface?

4

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) step 4

4. The web server uses the outside global address of the client as the destination address when responding.

Fill in the blank.Using legacy inter-VLAN routing, how many physical router interfaces have to be configured to support 5 VLANs?​

5

Refer to the exhibit. Router R2 is configured with static NAT. Place in order the steps that occur when the client accesses the web server through the router. (Not all options are used.) - Step 5

5. R2 receives the packet from the web server. R2 checks the NAT table, then translates the source address of the web server into an inside global address and forwards the packet.

Fill in the blank. Use a number. The syslog protocol uses UDP port _________to send event notification messages across IP networks to event message collectors.

514

How long is the evaluation license period for Cisco IOS Release 15.0 software packages?

60 Days

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

Refer to the exhibit. How many broadcast domains are displayed?

8

What address and prefix length is used when configuring an IPv6 default static route?

::/0

Match the dynamic routing protocol component to the characteristic. (Not all options are used.) - algorithm

A finite list of steps used to determine the best path

Refer to the exhibit. A network technician is troubleshooting connectivity issues in an Ethernet network with the command show interfaces fastEthernet 0/0 . What conclusion can be drawn based on the partial output in the exhibit?

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

A small college uses VLAN 10 for the classroom network and VLAN 20 for the office network. What is needed to enable communication between these two VLANs while using legacy inter-VLAN routing?

A router with at least two LAN interfaces should be used.

If an organization is changing to include Cisco IP phones in its network, what design feature must be considered to ensure voice quality?

A separate VLAN is needed for voice traffic.

A high school uses VLAN15 for the laboratory network and VLAN30 for the faculty network. What is required to enable communication between these two VLANs while using the router-on-a-stick approach?

A switch with a port that is configured as a trunk is needed when connecting to the router.

Refer to the graphic. Which command would be used on router A to configure a static route to direct traffic from LAN A that is destined for LAN C?

A(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is removed from the running configuration.

Fill in the blank. An _______ permits or denies traffic through a router based on specific defined criteria.

ACL- Access Control List

Refer to the exhibit. Router R1 is configured for PAT. What is a possible reason that the addresses in the network are not translated?

Access-list 1 is misconfigured.

Refer to the exhibit. What should be done to allow PC-A to receive an IPv6 address from the DHCPv6 server?

Add the ipv6 dhcp relay command to interface Fa0/0.

Which statement is true about broadcast and collision domains?

Adding a switch to a network will increase the size of the broadcast domain.

Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface Fa0/0. Which conclusion can be drawn from this configuration?​

All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.

Refer to the exhibit. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are not able to send traffic to workstations on SW2. What could be done to remedy the problem?

Allow VLAN 20 on the trunk link.

Which scenario would cause an ACL misconfiguration and deny all traffic?

Apply an ACL that has all deny ACE statements.

Which dynamic routing protocol was developed to interconnect different Internet service providers?

BGP

Refer to the exhibit. The network administrator needs to configure a default route on the Border router. Which command would the administrator use to configure a default route that will require the least amount of router processing when forwarding packets?

Border(config)# ip route 0.0.0.0 0.0.0.0 s0/0/1

What is different between IPv6 routing table entries compared to IPv4 routing table entries?

By design IPv6 is classless so all routes are effectively level 1 ultimate routes.

Which two route source codes are automatically created within a routing table whenever a router interface is configured with an IP address and activated? (Choose two.)

C L

Which route would be automatically created when a router interface is activated and configured with an IP address?

C 192.168.0.0/24 is directly connected, FastEthernet 0/0

Which statement is true about CDP on a Cisco device?​

CDP can be disabled globally or on a specific interface​.

Match the step to each switch boot sequence description. Step 3

CPU register nationalizations

Which packet-forwarding method does a router use to make switching decisions when it is using a forwarding information base and an adjacency table?

Cisco Express Forwarding

Order the steps of configuring a router as a DHCPv4 server. (Not all options are used.) - step 2

Configure a DHCP Pool

Refer to the exhibit. What routing solution will allow both PC A and PC B to access the Internet with the minimum amount of router CPU and network bandwidth utilization?

Configure a static default route from R1 to Edge, a default route from Edge to the Internet, and a static route from Edge to R1.

A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?

Connect a host to an interface associated with VLAN 99.

A new junior network intern connects a laptop to an access layer switch in the wiring closet. After configuring a terminal emulation program, the intern presses the Enter key, and the S1_ATC_E2> prompt appears. What could have been done to better protect the switch?

Create a console password.

What code is used in the routing table to identify routes learned through EIGRP?

D

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface?

DAD-Duplicate Address Detection

As a DHCPv4 client lease is about to expire, what is the message that the client sends the DHCP server?

DHCPREQUEST

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server?

DHCP_REQUEST

A company implements the stateless DHCPv6 method for configuring IPv6 addresses on employee workstations. After a workstation receives messages from multiple DHCPv6 servers to indicate their availability for DHCPv6 service, which message does it send to a server for configuration information?

DHCPv6 INFORMATION-REQUEST

Order the steps of configuring a router as a DHCPv4 server. (Not all options are used.) - step 3

Define the default gateway router

What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?

Enter the switchport access vlan 3 command in interface configuration mode.

Match the dynamic routing protocol component to the characteristic. (Not all options are used.) - routing protocols messages

Exchanges routing information and maintains accurate information about networks

Order the steps of configuring a router as a DHCPv4 server. (Not all options are used.) - Step 1

Exclude IP addresses

What is the destination address in the header of a broadcast frame?

FF-FF-FF-FF-FF-FF

A company uses DHCP servers to dynamically assign IPv4 addresses to employee workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

FF-FF-FF-FF-FF-FF and 255.255.255.255

Which destination IP address is used when an IPv6 host sends a DHCPv6 SOLICIT message to locate a DHCPv6 server?

FF02::1:2

True or False?A standard ACL filters network traffic based on the destination MAC address.

False

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: bin

File extension

Refer to the following output. What is the significance of the 4 match(es) statement? R1# <output omitted> 10 permit 192.168.1.56 0.0.0.7 20 permit 192.168.1.64 0.0.0.63 (4 match(es)) 30 deny any (8 match(es))

Four packets have been allowed through the router from PCs in the network of 192.168.1.64.

What command, or set of commands, would be used to determine if the following configuration on router HQ works as designed? ip route 0.0.0.0 0.0.0.0 serial 0/0/0 10 ip route 0.0.0.0 0.0.0.0 serial 0/1/0

HQ(config)# interface serial 0/1/0 HQ(config-if)# shutdown HQ(config-if)# end HQ# show ip route

Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?

IPBase

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

If the LED is green, the port is operating at 100 Mb/s.

Refer to the exhibit. What does R1 use as the MAC address of the destination when constructing the frame that will go from R1 to Server B?

If the destination MAC address that corresponds to the IPv4 address is not in the ARP cache, R1 sends an ARP request.

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) step 3

If there is no translation entry for this IP addres, R1 determines that the source address 192.168.10.10 must be translated.

Which statement describes a difference between the operation of inbound and outbound ACLs?

Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.

Refer to the exhibit. A technician is configuring R2 for static NAT to allow the client to access the web server. What is a possible reason that the client PC cannot access the web server?

Interface S0/0/0 should be identified as the outside NAT interface.

Which action will bring an error-disabled switch port back to an operational state?

Issue the shutdown and then no shutdown interface commands.

What is the purpose of a routing protocol?

It allows a router to share information about known networks with other routers.

What is the major benefit of using NAT with Port Address Translation?

It allows many internal hosts to share the same public IPv4 address.

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?

It allows only VLAN 30 on Fa0/5.

What is the purpose of entering the command ip nat inside source static tcp 192.168.10.2 80 209.165.200.223 8080 at the global configuration prompt?

It binds the inside local address and local port to the specified inside global address and global port.

What is an advantage of configuring a Cisco router as a relay agent?

It can provide relay services for multiple UDP services.

What is a characteristic of a default static route? ​

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

What is a characteristic of a static route that matches all packets?

It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

What is a purpose of the network command when configuring RIPv2 as the routing protocol?

It identifies the interfaces that belong to a specified network.

What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP?

It is a SOHO or home broadband router.

What is a characteristic of an IPv4 loopback interface on a Cisco IOS router?​

It is a logical interface internal to the router.

What is correct in relation to NAT for IPv6?

It is a temporary mechanism to assist in the migration from IPv4 to IPv6.

What statement describes a Cisco IOS image with the "universalk9_npe" designation for Cisco ISR G2 routers?

It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.​

Consider the following routing table entry for R1: D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 What is the significance of the Serial0/0/0?

It is the interface on R1 used to send data that is destined for 10.1.1.0/24.

Which statement accurately describes dynamic NAT?

It provides an automated mapping of inside local to inside global IP addresses.

How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method?

It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address.

A network administrator configures a router to send RA messages with M flag as 0 and O flag as 1. Which statement describes the effect of this configuration when a PC tries to configure its IPv6 address?

It should use the information that is contained in the RA message and contact a DHCPv6 server for additional information.

Which method is used by a PAT-enabled router to send incoming packets to the correct inside hosts?​

It uses the destination TCP or UDP port number on the incoming packet.

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: M4

Maintenance release and rebuild number

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: 15

Major release number

Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?

Manually add the new deny ACE with a sequence number of 5.

Consider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 How would an administrator test this configuration?

Manually shut down the router interface used as a primary route.

An administrator issued the following commands on router R1: R1(config)# logging 192.168.10.2 R1(config)# logging trap 5 What conclusion can be drawn from this configuration?

Messages with severity level of 6 or higher appear only on the router console output.

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: 1

Minor release number

Refer to the exhibit. The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?

Modify the transport input command.

A network administrator enters the command copy running-config startup-config . Which type of memory will the startup configuration be placed into?

NVRAM

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: 4

New feature release number

Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?

No collisions will occur on this link.

Refer to the exhibit. The NAT configuration applied to the router is as follows: ERtr(config)# access-list 1 permit 10.0.0.0 0.255.255.255 ERtr(config)# ip nat pool corp 209.165.201.6 209.165.201.30 netmask 255.255.255.224 ERtr(config)# ip nat inside source list 1 pool corp overload ERtr(config)# ip nat inside source static 10.10.10.55 209.165.201.4 ERtr(config)# interface gigabitethernet 0/0 ERtr(config-if)# ip nat inside ERtr(config-if)# interface serial 0/0/0 ERtr(config-if)# ip nat outside Based on the configuration and the output shown, what can be determined about the NAT status within the organization?

Not enough information is given to determine if both static and dynamic NAT are working.

Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

Which statement describes a syslog server characteristic?​

One advantage of viewing syslog messages on a syslog server is the ability to perform detailed searches through the data.

Refer to the exhibit. Based on the output that is shown, what type of NAT has been implemented?

PAT using an external interface

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which PCs will receive the broadcast sent by PC-C?

PC-D, PC-E

An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?

Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Refer to the exhibit. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Packets with unknown source addresses will be dropped.

Refer to the exhibit. Which set of commands will configure static routes that will allow the Park and the Alta routers to a) forward packets to each LAN and b) direct all other traffic to the Internet?

Park(config)# ip route 0.0.0.0 0.0.0.0 192.168.14.1 Alta(config)# ip route 10.0.234.0 255.255.255.0 192.168.14.2 Alta(config)# ip route 0.0.0.0 0.0.0.0 s0/0/0

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: C1900

Platform on which the image runs

Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?

Port Fa0/11 will be returned to VLAN 1.

What is the purpose of port forwarding?What is the purpose of port forwarding?

Port forwarding allows an external user to reach a service on a private IPv4 address that is located inside a LAN.

When a customer purchases a Cisco IOS 15.0 software package, what serves as the receipt for that customer and is used to obtain the license as well?

Product Activation Key

Which route would be used to forward a packet with a source IPv6 address of 2001:DB8:F00D:1::1 and a destination IPv6 address of 2001:DB8:CAFE:2::1?

R 2001:DB8:CAFE:2::/64 [120/3] via FE80::201:84FF:FEAC:8501, GigabitEthernet0/0

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) - Step 2

R1 checks the NAT configuration to determine if this packet should be translated

Refer to the exhibit. The small company shown uses static routing. Users on the R2 LAN have reported a problem with connectivity. What is the issue?

R1 needs a static route to the R2 LAN.

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) Step 5

R1 replaces the address 192.168.10.10 with a translated inside global address

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) - step 4

R1 selects an available global address from the dynamic address pool

A network administrator is configuring a static NAT on the border router for a web server located in the DMZ network. The web server is configured to listen on TCP port 8080. The web server is paired with the internal IP address of 192.168.5.25 and the external IP address of 209.165.200.230. For easy access by hosts on the Internet, external users do not need to specify the port when visiting the web server. Which command will configure the static NAT?

R1(config)# ip nat inside source static tcp 192.168.5.25 8080 209.165.200.230 80

Refer to the exhibit. Which default static route command would allow R1 to potentially reach all unknown networks on the Internet?

R1(config)# ipv6 route ::/0 G0/1 fe80::2

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

Refer to the exhibit. A network administrator wants to create a standard ACL to prevent network 1 traffic from being transmitted to the Research and Development network. On which router interface and in which direction should the standard ACL be applied?

R2 Gi0/0 outbound

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?

RAM

Which routing protocol is limited to smaller network implementations because it does not accommodate growth for larger networks?

RIP

Refer to the exhibit. All hosts and router interfaces are configured correctly. Pings to the server from both H1 and H2 and pings between H1 and H2 are not successful. What is causing this problem?

RIPv2 is misconfigured on router R2.

Which step should be performed first when deleting a VLAN that has member switch ports?

Reassign all VLAN member ports to a different VLAN.

A network engineer purchases, installs, and activates a license key on a Cisco 2911 ISR G2 router. What is the next step in the installation process?

Reload the router.

Which command will allow a network administrator to check the IP address that is assigned to a particular MAC address?

Router# show ip dhcp binding

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

Router# show ip nat translations

Which IPv6 static route would serve as a backup route to a dynamic route learned through OSPF?

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

Fill in the blank. _________ protocols are used to dynamically exchange routing information between routers.

Routing

Fill in the blank. In an Ethernet network, frames smaller than 64 bytes are called _____ .

Runt

Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?

S 10.16.0.0/24 [1/0] via 192.168.0.9

The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

S 172.16.1.0 [1/0] via 172.16.2.2

In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts?

SLAAC

What code in the Cisco IOS 15 image filename c1900-universalk9-mz.SPA.153-3.M.bin indicates that the file is digitally signed by Cisco?

SPA

Fill in the blank. The initialism _______ refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.

SSH

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky

A small publishing company has a network design such that when a broadcast is sent on the LAN, 200 devices receive the transmitted broadcast. How can the network administrator reduce the number of devices that receive broadcast traffic?

Segment the LAN into smaller LANs and route between them.

Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

Send the packet out the Serial0/0/0 interface.

Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?

Serial0/0/1

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: universalk9

Specifying the feature set

Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)

Step 1-DHCP_DISCOVER Step 2-DHCP_OFFER Step 3-DHCP_REQUEST Step 4-DHCP_ACK

Match the steps that are taken by a router in the route look up process when it receives a packet, there is no match, and the packet is eventually dropped. (Not all options are used.)

Step 1: examining level 1 network routes for the best match Step 2: examining child routes of the parent route for the best match Step 3: searching level 1 supernet routes for the best match Step 4: determining if a default route exists Step 5: dropping the packet

Match the dynamic routing protocol component to the characteristic. (Not all options are used.) - Data structures

Tables or databases that area stored in RAM

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Refer to the exhibit. What will happen to the access list 10 ACEs if the router is rebooted before any other commands are implemented?

The ACEs of access list 10 will be renumbered.

A network administrator is configuring an ACL to restrict access to certain servers in the data center. The intent is to apply the ACL to the interface connected to the data center LAN. What happens if the ACL is incorrectly applied to an interface in the inbound direction instead of the outbound direction?

The ACL does not perform as designed.

What is the effect of configuring an ACL with only ACEs that deny traffic?

The ACL will block all traffic.

What is the result of a network technician issuing the command ip dhcp excluded-address 10.0.15.1 10.0.15.15 on a Cisco router?

The Cisco router will exclude 15 IP addresses from being leased to DHCP clients.

Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?

The VLAN that is used by PC-A is not in the list of allowed VLANs on the trunk.

An administrator wants to send log messages for all severity levels from a router to its console. Which procedure should the administrator follow to accomplish this?

The administrator needs to do nothing, because Cisco routers send log messages for all severity levels to the console by default.

Which statement describes a result after multiple Cisco LAN switches are interconnected?

The broadcast domain expands to all switches.

When a client is requesting an initial address lease from a DHCP server, why is the DHCPREQUEST message sent as a broadcast?

The client may have received offers from multiple servers, and the broadcast serves to implicitly decline those other offers.

After booting, a client receives an ICMPv6 RA message with the M flag set to 0 and the O flag set to 1. What does this indicate?

The client should automatically configure an IPv6 address and then contact a DHCPv6 server for more information.

A network engineer has configured a router with the command ip nat inside source list 4 pool corp overload . Why did the engineer use the overload option?

The company has more private IP addresses than available public IP addresses.

Refer to the exhibit. What is the cause of the error that is displayed in the configuration of inter-VLAN routing on router CiscoVille?

The encapsulation dot1Q 20 command has not been configured.​

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.) - Step 1

The host sends an available global address from the dynamic address pool

A network administrator configures the interface fa0/0 on the router R1 with the command ip address 172.16.1.254 255.255.255.0 . However, when the administrator issues the command show ip route , the routing table does not show the directly connected network. What is the possible cause of the problem?

The interface fa0/0 has not been activated.

While configuring RIPv2 on an enterprise network, an engineer enters the command network 192.168.10.0 into router configuration mode. What is the result of entering this command?

The interface of the 192.168.10.0 network is sending only version 2 updates.

An administrator has configured a DHCPv4 relay router and issued these commands: Router(config)# interface g0/0 Router(config-if)# ip address 10.0.1.1 255.255.255.0 Router(config-if)# no shutdown Router(config-if)# exit Router(config)# ip dhcp pool RELAY Router(dhcp-config)# end The clients are not receiving IP parameters from the DHCPv4 server. What is a possible cause?

The ip helper-address command is missing.

Refer to the exhibit. PC-A is unable to receive an IPv6 address from the stateful DHCPv6 server. What is the problem?

The ipv6 dhcp relay command should be applied to interface Gig0/0.

What occurs next in the router lookup process after a router identifies a destination IP address and locates a matching level 1 parent route?

The level 2 child routes are examined.

A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers?

The network administrator wants to verify Layer 2 connectivity.

What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?

The port becomes inactive.

A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?

The port is operational and ready to transmit packets.

Refer to the exhibit. What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has port security enabled.

When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool?

The request to the server for the seventh user fails.

A network administrator has examined the routing table of a router and noted that the entry for the destination network 172.16.4.0/24 begins with the letter D. What does this letter signify?

The route source was learned dynamically.

Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the Internet. What is a possible reason for this lack of connectivity?

The router NAT configuration has an incorrect inside local address.

What occurs next in the router lookup process after a router identifies a destination IPv6 address and locates a matching level 1 network route?

The router forwards the packet.

Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

The router is configured for SLAAC operation.

Refer to the exhibit. A network administrator is configuring a router for DHCPv6 operation. Which conclusion can be drawn based on the commands?

The router is configured for stateless DHCPv6 operation.

Refer to the exhibit. A network administrator is implementing stateful DHCPv6 operation for the company. However, the clients are not using the prefix and prefix-length information that is configured in the DHCP pool. The administrator issues a show ipv6 interface command. What could be the cause of the problem?

The router is configured for stateless DHCPv6 operation.

What is a characteristic of legacy inter-VLAN routing?

The router requires one Ethernet link for each VLAN.

A network administrator configures a router with the command sequence: R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin R1(config)# boot system rom What is the effect of the command sequence?

The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.

Which configuration must be in place for the auto-MDIX feature to function on a switch interface?

The speed and duplex of the interface must be configured for auto detect.

What happens to a static route entry in a routing table when the outgoing interface associated with that route goes into the down state?

The static route is removed from the routing table.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why are the pings from PC0 to Server0 not successful?

The static route to network 192.168.2.0 is misconfigured on Router1.​

What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?​​

The sticky secure MAC addresses remain part of the address table but are removed from the running configuration.

What would be the most common reason that a network technician would see the following Cisco switch prompt after the switch boots? switch:

The switch operating system cannot be found.

A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?

The syslog client will send to the syslog server any event message that has a severity level of 4 and lower.​

Refer to the exhibit. What media issue might exist on the link connected to Fa0/1 based on the show interface command?

There could be too much electrical interference and noise on the link.

Refer to the exhibit. A router-on-a-stick configuration was implemented for VLANs 15, 30, and 45, according to the show running-config command output. PCs on VLAN 45 that are using the 172.16.45.0 /24 network are having trouble connecting to PCs on VLAN 30 in the 172.16.30.0 /24 network. Which error is most likely causing this problem?​

There is an incorrect IP address configured on GigabitEthernet 0/0.30.

What is a disadvantage of NAT?

There is no end-to-end addressing.

What is a characteristic of unique local addresses?

They allow sites to be combined without creating any address conflicts.

Which statement describes IPv6 ULAs?

They are not routable across the Internet.

What is a disadvantage of using dynamic routing protocols?

They send messages about network status insecurely across networks by default.

Refer to the exhibit. What can be determined from the partial output of the show running-config command?

This appears to be the default configuration of the switch.

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown? R1# <output omitted> Standard IP access list 2 10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches) 20 deny any (1 match)

Two devices were able to use SSH or Telnet to gain access to the router.

A network administrator is examining a RIPv2 routing table and notices that several subnets are advertised in individual entries. What can an administrator do to enable a RIPv2 router to automatically group multiple directly attached subnetworks into a single network statement?

Use the auto-summary command.

A network administrator configures a static route on the edge router of a network to assign a gateway of last resort. How would a network administrator configure the edge router to automatically share this route within RIP?

Use the default-information originate command.

What is the quickest way to remove a single ACE from a named ACL?

Use the no keyword and the sequence number of the ACE to be removed.

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

Match the components of the IOS image name to their description c1900-universalk9-mz.SPA.151-4.M4.bin?: MZ

Where the image runs and if the file is compressed

A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?

a 192.168.14.0/26 route that is learned via RIP

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp . What is required to be configured in order for this particular command to be functional?

a NAT pool named corp that defines the starting and ending public IP addresses

Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)-VLAN

a VLAN number

What is a collapsed core in a network design?

a combination of the functionality of the distribution and core layers

A network administrator is asked to provide the UDI in order to obtain a license for the DATA technology package for the IOS 15.0 on a Cisco 1900 router. What is a UDI?

a combination of the product ID, the serial number, and the hardware version

What route would have the lowest administrative distance?

a directly connected network

Which solution would help a college alleviate network congestion due to collisions?

a high port density switch

A technician is required to configure an edge router to use a different TCP port number for each session with a server on the Internet. What type of Network Address Translation (NAT) should be implemented?

a many-to-one address mapping between local and global addresses

Which type of standard ACL is easiest to modify on a production router?

a named ACL that has not been applied yet

A destination route in the routing table is indicated with a code D. Which kind of route entry is this?

a route dynamically learned through the EIGRP routing protocol

Consider the following command: ip route 192.168.10.0 255.255.255.0 10.10.10.2 5 Which route would have to go down in order for this static route to appear in the routing table?

a static route to the 192.168.10.0/24 network

What type of route has a network address with a subnet mask that is less than the classful equivalent?

a supernet route

Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)- TYPE

a value for the tag protocol ID value

Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)-User Priority

a value that supports level of service implementation

Refer to the exhibit. Which command would be used in a standard ACL to allow only devices on the network attached to R2 G0/0 interface to access the networks attached to R1?

access-list 1 permit 192.168.10.96 0.0.0.31

What single access list statement matches all of the following networks? 192.168.16.0 192.168.17.0 192.168.18.0 192.168.19.0

access-list 10 permit 192.168.16.0 0.0.3.255

Refer to the exhibit. The PC that is attached to port Fa0/1 is sending a packet that has the destination MAC address of 0050.0fae.299c. Based on the current S1 MAC address table, what will S1 do first when the packet arrives at the switch?

add the MAC address of the PC that is attached to Fa0/1 to the MAC address table

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)-192.168.3.64 0.0.0.7

addresses with a subnet mask of 255.255.255.248

The output of the show ip route command contains the following entry: S 10.2.0.0 [1/0] via 172.16.2.2. What value is indicated by the 1 in the [1/0] portion of the output?

administrative distance

match the link state to the interface and protocol status - Disabled

administratively down

What is a basic function of the Cisco Borderless Architecture distribution layer?

aggregating Layer 3 routing boundaries

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)-host 192.168.15.12

all IP address bits must match exactly

What is the purpose of the passive-interface command?

allows a router to receive routing updates on an interface but not send updates via that interface

Match the borderless switched network guideline description to the principle. (Not all options are used.) - Flexibility

allows intelligent traffic load sharing by using all network resources

Match the borderless switched network guideline description to the principle. (Not all options are used.)- modularity

allows seamless network expansion and integrated service ennoblement on an on-demand basis

A network administrator configures the border router with the command R1(config)# ip nat inside source list 4 pool corp. Which ACL is required to be configured in order for this command to function?

an access list that is numbered 4 that defines the private addresses that are affected by NAT

Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)- Canonical Format Identifier

an identifier that enables Token Ring frames to be carried across Ethernet links

Which impact does adding a Layer 2 switch have on a network?

an increase in the size of the broadcast domain

Which type of route will require a router to perform a recursive lookup?

an ultimate route that is using a next hop IP address on a router that is not using CEF

Which command is used to set the BOOT environment variable that defines where to find the IOS image file on a switch?

boot system

Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?

broadcast DHCPREQUEST

During the process of encapsulation, how does the PC determine if the packet is destined for a host on a remote network?

by performing the AND operation on the destination IP address and its own subnet mask

Which service is provided by an automated attendant feature on a converged network?

call routing

Which address does a DHCPv4 server target when sending a DHCPOFFER message to a client that makes an address request?

client hardware address

An administrator issues the commands: Router(config)# interface g0/1 Router(config-if)# ip address dhcp What is the administrator trying to achieve?

configuring the router to obtain IP parameters from a DHCPv4 server

What is the primary purpose of NAT?

conserve IPv4 addresses

What is used as the default event logging destination for Cisco routers and switches?

console line

What type of network uses one common infrastructure to carry voice, data, and video signals?

converged

Which switching method describes a switch that transfers a frame as soon as the destination MAC address is read?

cut-through

Which syslog message type is accessible only to an administrator and only via the Cisco CLI?

debugging

What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?

default route

Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination IP address

What is one function of a Layer 2 switch?

determines which interface is used to forward a frame based on the destination MAC address

Which type of static route that is configured on a router uses only the exit interface?

directly connected static route

What is a definition of a two-tier LAN network design?

distribution and core layers collapsed into one tier, and the access layer on a separate tier

What is a disadvantage of using router-on-a-stick inter-VLAN routing?

does not scale well beyond 50 VLANs

match the link state to the interface and protocol status - Layer 1 problem

down/down

In the process of building and maintaining a larger network, you will find that ________routing is simpler to configure than static routing.

dynamic

A company designs its network so that the PCs in the internal network are assigned IP addresses from DHCP servers, and the packets that are sent to the Internet are translated through a NAT-enabled router. What type of NAT enables the router to populate the translation table from a pool of unique public addresses, as the PCs send packets through the router to the Internet?

dynamic NAT

Which is a DHCPv4 address allocation method that assigns IPv4 addresses for a limited lease period?

dynamic allocation

What is the effect of using the switchport port-security command?

enables port security on an interface

A network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet?

encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface

Match the step to each switch boot sequence description. Step 1

execute POST

Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?​

extended star

Match the borderless switched network guideline description to the principle. (Not all options are used.) - hierarchical

facilitates understanding the role of each device at every tier, simplifies deployment, operation, management, and reduces fault domains at every tier

A local law firm is redesigning the company network so that all 20 employees can be connected to a LAN and to the Internet. The law firm would prefer a low cost and easy solution for the project. What type of switch should be selected?

fixed configuration

Match the step to each switch boot sequence description. Step 4

flash file system initialization

In which location are the normal range VLANs stored on a Cisco switch by default?

flash memory

A ________ static route can be used to provide a backup route to a dynamically learned route.

floating

What type of static route is created when the next-hop IP address and exit interface are specified?

fully specified static route

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

gateway of last resort

Which type of ACL statements are commonly reordered by the Cisco IOS as the first ACEs?

host

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)-192.168.5.0 0.0.3.255

hosts in a subnet with the subnet mask 255.255.252.0

Match the routing table entry to the corresponding function. (Not all options are used.) - route source

identifies how the route was learned:

Match the routing table entry to the corresponding function. (Not all options are used.) - destination network

identifies the address of a remote network

Match the routing table entry to the corresponding function. (Not all options are used.) - Administrative distance

identifies the trustworthiness of a route source:

Match the routing table entry to the corresponding function. (Not all options are used.) - metric

identifies the value assigned to reach a remote network:

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations.What is the missing command on S1?

ip address 192.168.99.2 255.255.255.0

Refer to the exhibit. The network engineer for the company that is shown wants to use the primary ISP connection for all external connectivity. The backup ISP connection is used only if the primary ISP connection fails. Which set of commands would accomplish this goal?

ip route 0.0.0.0 0.0.0.0 s0/0/0 ip route 0.0.0.0 0.0.0.0 s0/1/0 10

What is the correct syntax of a floating static route?

ip route 209.165.200.228 255.255.255.248 10.0.0.1 120

Which command should be configured on a router interface to set the router as a stateful DHCPv6 client?

ipv6 address dhcp

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What IPv6 static route can be configured on router R1 to make a fully converged network?

ipv6 route 2001:db8:10:12::/64 S0/0/1

Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?

ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2

Which static route statement shows a recursive IPv6 static route?

ipv6 route 2001:db8:cafe:1::/56 2001:db8:1000:10::1

Which command would create a valid IPv6 default route?

ipv6 route ::/0 2001:db8:acad:2::a

Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features?

license accept end user agreement

What is the first action in the boot sequence when a switch is powered on?

load a power-on self-test program

Match the step to each switch boot sequence description. Step 5

load the IOS

Match the step to each switch boot sequence description. Step 2

load the boot loader from ROM

What is a possible cause of runt Ethernet frames when a switch is being used?

malfunctioning NIC

Which distinct type of VLAN is used by an administrator to access and configure a switch?

management VLAN

When the appropriate switch form factor for a network is being determined, what type of switch should be selected when future expansion is important and cost is not a limiting factor?

modular switch

Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

native

When a Cisco switch receives untagged frames on a 802.1Q trunk port, which VLAN ID is the traffic switched to by default?

native VLAN ID

Which function is supplied by the access layer in a three-layer network design?

network access

Refer to the exhibit. A network administrator has configured R1 as shown. When the administrator checks the status of the serial interface, the interface is shown as being administratively down. What additional command must be entered on the serial interface of R1 to bring the interface up?

no shutdown

Which command is used to remove only VLAN 20 from a switch?

no vlan 20

When would it be more beneficial to use static routing instead of dynamic routing protocols?

on a network where dynamic updates would pose a security risk

When would it be more beneficial to use a dynamic routing protocol instead of static routing?

on a network where there is a lot of topology changes

If one end of an Ethernet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed?

on the half-duplex end of the connection

On which router should the show access-lists command be executed?

on the router that has the ACL configured

Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

outbound on the R1 G0/1 interface

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.Which ping command from PC0 to PC1 completes successfully?

ping 192.168.2.3

What is an advantage of deploying IPv4 NAT technology for internal hosts in an organization?

provides flexibility in designing the IPv4 addressing scheme

Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

restrict

Typically, which network device would be used to perform NAT for a corporate environment?

router

Which network device can serve as a boundary to divide a Layer 2 broadcast domain?

router

Refer to the exhibit. From what location have the syslog messages been retrieved?

router RAM

Refer to the exhibit. Which implementation of inter-VLAN routing does this topology use?

router on a stick

Match the borderless switched network guideline description to the principle. (Not all options are used.) - resiliency

satisfies user expectations for keeping the network always on

Refer to the exhibit. The routing table for R2 is as follows: Gateway of last resort is not set 10.0.0.0/30 is subnetted, 2 subnets C 10.0.0.0 is directly connected, Serial0/0/0 C 10.0.0.4 is directly connected, Serial0/0/1 192.168.10.0/26 is subnetted, 3 subnets S 192.168.10.0 is directly connected, Serial0/0/0 C 192.168.10.64 is directly connected, FastEthernet0/0 S 192.168.10.128 [1/0] via 10.0.0.6 What will router R2 do with a packet destined for 192.168.10.129?

send the packet out interface Serial0/0/1

Fill in the blank. Do not abbreviate.An administrator is troubleshooting a DHCPv4 issue on a router. By issuing the debug ip dhcp ___________command, the administrator can watch, in real time, the IP address assignments that are performed by the router.

sever events

Which command produced the following output? R1# 10 permit 192.168.1.56 0.0.0.7 20 permit 192.168.1.64 0.0.0.63 (4 match(es)) 30 deny any (8 match(es))

show access-lists

A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?

show flash0:

A network administrator has entered a static route to an Ethernet LAN that is connected to an adjacent router. However, the route is not shown in the routing table. Which command would the administrator use to verify that the exit interface is up?

show ip interface brief

Which command would a network engineer use to find the unique device identifier of a Cisco router?

show license udi

Which address is required in the command syntax of a standard ACL?

source IP address

Which type of address does a switch use to build the MAC address table?

source MAC address

When an appropriate switch form factor for a network is being determined, what should be selected when fault tolerance and bandwidth availability are desired but the budget is limited?

stackable switch

Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured?

stateless DHCPv6

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?

stateless DHCPv6ds

Which option correctly describes a switching method?

store-and-forward: ensures that the frame is free of physical and data-link errors

A ________ network is a network that is accessed by a single route.

stud

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)-192.168.15.144 0.0.0.15

subnetwork address of a subnet with 14 valid host addresses

Which network device can be used to eliminate collisions on an Ethernet network?

switch

Match the action to the corresponding command. (Not all options are used.)- activates the current interface as

switchport mode trunk

Match the action to the corresponding command. (Not all options are used.) - Prohibits VLAN 10 on the trunk interface

switchport trunk allowed vlan remove 10

Match the action to the corresponding command. (Not all options are used.) - assigns VLAN 10 for untagged

switchport trunk native vlan 10

Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?

switchport trunk native vlan 66

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

synchronizes the system clock with the time source with IP address 10.1.1.1

Which protocol or service allows network administrators to receive system messages that are provided by network devices?

syslog

Which technology via the syslog protocol enhances real-time debugging by displaying the date and time associated with each monitored event?

syslog service timestamps

Which technology allows syslog messages to be filtered to different devices based on event importance?​

syslog severity levels​

Which software is used for a network administrator to make the initial router configuration securely?

terminal emulation client software

What is a gateway of last resort?

the IP address of another router

What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

the IP address of the neighbor

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

the MAC address of the IPv6 enabled interface

What is the meaning of the number 10 in the encapsulation dot1Q 10 native router subinterface command?​

the VLAN ID

A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be displayed?

the VLAN assignment and membership for all switch ports

Match each statement with the example subnet and wildcard that it describes. (Not all options are used.)-192.168.15.65 255.255.255.240

the first valid host address in a subnet

A company uses the SLAAC method to configure IPv6 addresses for the employee workstations. Which address will a client use as its default gateway?​

the link-local address of the router interface that is attached to the network

When a router learns that multiple paths are available to a destination network from the same routing protocol, which factor is considered by a router to choose the best path to forward a packet?

the lowest metric

What does the term "port density" represent for an Ethernet switch?

the number of available ports

What is defined by the ip nat pool command when configuring dynamic NAT?

the pool of global address

Refer to the exhibit. What does the number 17:46:26.143 represent?

the time when the syslog message was issued

Refer to the exhibit. Consider that the main power has just been restored. PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?​

to Fa0/1, Fa0/2, and Fa0/3 only

What is the purpose of the switch command switchport access vlan 99?

to assign the port to a particular VLAN

Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?

to be used as a backup route

Refer to the exhibit. What is the purpose of the router port that is shown?

to configure the router

Why would a network administrator issue the show cdp neigbors command on a router?

to display device ID and other information about directly connected Cisco devices

What is the effect of configuring the ipv6 unicast-routing command on a router?

to enable the router as an IPv6 router

What is the purpose of classifying Cisco IP routing table entries as ultimate route, level 1 route, level 1 parent route, and level 2 child routes?

to explain the operation of the hierarchical structure of the routing table

Why are routers needed in networking?

to forward network traffic to remote networks

A network administrator configures a router by the command ip route 0.0.0.0 0.0.0.0 209.165.200.226 . What is the purpose of this command?

to provide a route to forward packets for which there is no route in the routing table

What is a function of the switch boot loader?

to provide an environment to operate in when the switch operating system cannot be found

Why would a summarized static route be configured on a router?

to reduce the size of the routing table

When configuring a router as part of a router-on-a-stick inter-VLAN routing topology, where should the IP address be assigned?

to the subinterface

For what reason would a network administrator use the show interfaces trunk command on a switch?

to view the native VLAN

In applying an ACL to a router interface, which traffic is designated as outbound?

traffic that is leaving the router and going toward the destination host

Match the step to each switch boot sequence description. Step 6

transfer switch control to the IOS

True or False? The name of a named standard ACL is case sensitive.

true

Which Cisco IOS 15 technology package would be needed to implement voice over IP?

uck9

match the link state to the interface and protocol status - Layer 2 problem

up/down

match the link state to the interface and protocol status - operational

up/up

Which type of router connection can be secured by the access-class command?

vty

In which situation would a technician use the show interfaces switch command?

when packets are being dropped from a particular directly attached host

When would a network designer be concerned with RUs?

when purchasing a specific number of switches for a network rack

In which configuration would an outbound ACL placement be preferred over an inbound ACL placement?

when the ACL is applied to an outbound interface to filter packets coming from multiple inbound interfaces before the packets exit the interface

When would a network administrator use the clear access-list counters command?

when troubleshooting an ACL and needing to know how many packets matched


Ensembles d'études connexes

step 5: evaluating outcomes and your thinking (evaluation)

View Set

Chapter 1 :Real Estate Licensing and Endorsement

View Set

CHEM 3070 Exam #3 Chp. 4, 16, 18

View Set

Chapter 43: Care of the Patient with a Musculoskeletal Disorder

View Set